SDR Implementation of a D2D Security Cryptographic Mechanism

被引:9
作者
Balan, Titus N. [1 ]
Balan, Alexandra C. [1 ]
Sandu, Florin D. [1 ]
机构
[1] Transilvania Univ Brasov, Dept Elect & Comp, Brasov 500024, Romania
关键词
Device to device; Diffie-Hellman key exchange; encryption; elliptic-curve cryptography; key management; physically unclonable function; proximity services (ProSe); security; software defined radio (SDR); stream cyphering; Salsa20/20;
D O I
10.1109/ACCESS.2019.2904909
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environment. This paper proposes a security mechanism for D2D communication involving the use of physically unclonable functions (PUF) for unique key generation, elliptic-curve cryptography (ECC) and Diffie-Hellman key exchange (DHKE) for key management, and Salsa20/20 as stream cyphering encryption method, suitable for confidentiality of the wireless transmissions. All these methods are implemented and tested on a software defined radio (SDR) communication platform consisting of a Zync-based system-onchip (SoC), complemented by radio frequency (RF) daughter boards from analog devices-an integration using hardware and software co-design.
引用
收藏
页码:38847 / 38855
页数:9
相关论文
共 26 条
[1]  
Afreen R., 2011, REV ELLIPTIC CURVE C
[2]  
Ajithkumar V., 2017, ACCENTS T INF SECUR, V2, P2455, DOI [10.19101/TIS.2017.26001, DOI 10.19101/TIS.2017.26001]
[3]  
[Anonymous], 2017, 33303 TS
[4]   IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function" [J].
Bendavid, Ygal ;
Bagheri, Nasour ;
Safkhani, Masoumeh ;
Rostampour, Samad .
SENSORS, 2018, 18 (12)
[5]  
Certicom Research, 2010, SEC 2 REC ELL CURV D
[6]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[7]  
Confidentiality and Integrity Algorithms, 2017, 35221 3GPP TS
[8]  
Dustinta D., 2018, REV AIR FORCE ACAD, V1, P65
[9]  
Ekberg J.-E., 2014, WO Patent, Patent No. [2 014 207 506 A1, 2014207506]
[10]   Security in device-to-device communications: a survey [J].
Hamoud, Othmane Nait ;
Kenaza, Tayeb ;
Challal, Yacine .
IET NETWORKS, 2018, 7 (01) :14-22